Business and home users have taken to VoIP like ducks to water. To both, it offers cost savings and convenience. To businesses, it provides the opportunity to use advanced communications features over and above the traditional land-line POTS solution. Rolling out toll-free International calling and video-conferencing, providing advanced call management to customer support centres and improving their overall business profile is now achievable and a modest and controllable cost.
Originally needing big iron, small businesses can run a virtual PBX on a dedicated desktop PC and take advantage of those new offerings.
However, as with all digital advances, security comes into play and VoIP Security is no exception.Continue reading
VoIP Communication is a common feature in corporate and personal life nowadays. Most large concerns use it as a matter of course as part of their corporate integrated communications platform.
In the past, communications costs were inflated by unauthorised calls and other activities designed to get around telephone security policies. It’s no different today in VoIP Communications. People still try to make unauthorised calls inside the organisation, and people try to hijack the company communications networks to make their calls. Nothing really new, except that it’s now digital.Continue reading
VoIP for Business provides a range of benefits, including substantial cost-savings that make it a must-have for most businesses. However, as with most IT advances, VoIP has attracted the dark side of the developers. Hackers and scammers are using VoIP for Business as a way to steal data and execute hacking exploits.
As with other types of malware attacks, business need to be aware of how these exploits are executed and what preventative measures they can take.
The first thing to understand is that most successful hacking attacks are by having users provide sensitive information. Scammers are becoming more sophisticated, and they are increasingly using VoIP to steal personal and company data or just cause mischief.Continue reading
First we had viruses, then rootkits, now we have ransomware. One thing is certain, the next bit of malware technology is currently under development and be with us soon. Even systems like VoIP are under attack and are being used as portals to gain access to corporate information.
What kind of threats are currently being seen in VoIP systems and how are they to be countered?
The first thing to understand that because VoIP is based on IP technologies it is vulnerable to all the malware and attack techniques that are inflicted on IP networks. The second is that VoIP goes over the Internet, and while you can contain and manage IP security in your internal closed corporate network, you are at the mercy of third-party service providers of varying quality in their security systems. The third, and one often forgotten, is that all devices in the VoIP network are IP devices and are therefore vulnerable to all the threats found with other IP devices. That must be factored into the overall data and voice protection scenario.Continue reading